CN108521399A - A kind of video monitoring safety cut-in method based on equipment feature recognition and white list - Google Patents
A kind of video monitoring safety cut-in method based on equipment feature recognition and white list Download PDFInfo
- Publication number
- CN108521399A CN108521399A CN201810157447.8A CN201810157447A CN108521399A CN 108521399 A CN108521399 A CN 108521399A CN 201810157447 A CN201810157447 A CN 201810157447A CN 108521399 A CN108521399 A CN 108521399A
- Authority
- CN
- China
- Prior art keywords
- management host
- end management
- white list
- cpu
- device type
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of video monitoring safety cut-in method based on equipment feature recognition and white list, this method is based on the front end management host being connect with access device, the front end management host is equally connect by center switch with server with general switch, the CPU that function is detected and controlled with illegal access and unauthorized access is provided in the front end management host, multiple outside ports connected for access device are provided on the front end management host, each outside port is connect with the CPU of front end management host, the server can issue white list and device type identification feature library by center switch to every front end management host.The present invention combines the functions such as the common illegal access detection for realizing access device, the counterfeit detection of equipment, unauthorized access detection, automatic quickly device type identification and mandate, the mandate of gadget access, the mandate of emergency set using white list mechanism and device type feature recognition.
Description
【Technical field】
It is the present invention relates to the technical field of video surveillance network safety, more particularly to a kind of based on equipment feature recognition and white
The video monitoring safety cut-in method of list.
【Background technology】
Current video monitoring system is deeply applied to each industry field concerning national economy, wherein being also no lack of relationship
The important department of national security.It is the information with highly confidential value that this, which means that these video datas all, once by
It illegally steals, consequence is hardly imaginable.Therefore it for important department as each video surveillance network especially such as public security, needs
Perfect technological means is taken to prevent what security threat from bringing to seriously affect.
Video monitoring equipment deployment place is mostly exposed to the public places such as road, block, is easily maliciously invaded.Video
Monitoring system has come into IPC (web camera) epoch, and front end camera only needs one IP address of setting can be straight
It is connected in succession in video private network.When front end, camera is deployed in the wide free space in outdoor, easily by unauthorized personnel's object
Reason contact, to cause illegal invasion, equipment counterfeit and unauthorized access.So one kind can be detected with automatic identification equipment feature
Whether equipment is counterfeit, and the means of illegal invasion and unauthorized access is blocked to be very important.
【Invention content】
It is an object of the invention to overcome above-mentioned the deficiencies in the prior art, provide a kind of based on equipment feature recognition and white name
Single video monitoring safety cut-in method, aims to solve the problem that video monitoring equipment is easily maliciously invaded in the prior art, is caused
Illegal invasion, destruction and unauthorized access, the low technical problem of video monitoring system safety.
To achieve the above object, the present invention proposes a kind of video monitoring safety based on equipment feature recognition and white list
Cut-in method, this method are exchanged based on the front end management host being connect with access device, the front end management host with common
Machine is equally connect by center switch with server, is provided in the front end management host with illegal access and non-
The CPU of method access detection and control function is provided with multiple outsides connected for access device on the front end management host
Port, each outside port are connect with the CPU of front end management host, and the server can be by center switch to every
Platform front end management host issues white list and device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message,
The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port
Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device,
Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special
Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Enter less than if if matching white
List matching treatment returns to invalid device type and numbers if it fails to match for white list, and front end management host
CPU executes action according to user configuration, goes to S5;If white list successful match, goes to S6;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type
It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes
Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification
It levies in library, and goes to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching
Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent,
And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and
Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When
When thering is access device to access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow
When abnormal, report and alarm.
Preferably, the white list content includes:MAC Address, IP address, protocol type and port numbers, user is also
The white list on same front end management host can be allocated by server, is separately provided for each outside port white
List.
Preferably, the device type identification feature library includes:Device type number, device type title, equipment
The authorization message of type protocol feature, port numbers, message length and device type number, the device type protocol characteristic packet
Protocol number is included, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset letter
Breath.
Preferably, in the S2 and S4, if user configuration is alarm, the CPU of front end management host is sent
Warning information;If user configuration is to block and alert, the CPU of front end management host directly blocks the access device logical
Letter, and send a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
Preferably, the front end management host and general switch are communicated by a smooth cat with center switch respectively
Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
Preferably, the general switch can be substituted for front end management host, with center switch communication link
It connects.
Beneficial effects of the present invention:Compared with prior art, provided by the invention a kind of based on equipment feature recognition and white
The video monitoring safety cut-in method of list carries out Port Mirroring to access device by front end management host, message analysis, sets
The functions such as standby feature recognition, white list management realize that illegal access, equipment be counterfeit and unauthorized access detects and controls;
And access device can be blocked to communicate or only send a warning message etc. processing automatically according to user configuration, using white list mechanism and set
Standby type feature identification combines the common illegal access detection for realizing access device, the counterfeit detection of equipment, unauthorized access inspection
The functions, relatively biography such as survey, automatic quickly device type identification and mandate, the mandate of gadget access, the mandate of emergency set
The video monitoring system of system has the following advantages that:
1) secure accessing directly accomplishes front end management host port, can automatically rapidly identification equipment type, find it is illegal
It accesses and blocks, detect counterfeit equipment and access and block, automatically update asset identification library, gadget insertion authority, emergent award
Power processing etc.;
2) environment in an effective safety can be formed, while all being found and being blocked in up going port and down going port;
If 3) all deploy front end management host, it can ensure access safety in total system.
The feature and advantage of the present invention will be described in detail by embodiment combination attached drawing.
【Description of the drawings】
Fig. 1 is the layout of the video monitoring network system of the embodiment of the present invention;
Fig. 2 is a kind of video monitoring safety cut-in method based on equipment feature recognition and white list of the embodiment of the present invention
Flow chart.
【Specific implementation mode】
In order to make the objectives, technical solutions and advantages of the present invention clearer, below by accompanying drawings and embodiments, to this
Invention is further elaborated.However, it should be understood that the specific embodiments described herein are merely illustrative of the present invention,
The range being not intended to restrict the invention.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to keep away
Exempt from unnecessarily to obscure idea of the invention.
Refering to fig. 1 and Fig. 2, the embodiment of the present invention provide a kind of based on the video monitoring of equipment feature recognition and white list peace
Full cut-in method, this method are handed over based on the front end management host being connect with access device, the front end management host with common
Change planes and equally connect with server by center switch, be provided in the front end management host with illegal access and
Unauthorized access detects and controls the CPU of function, be provided on the front end management host it is multiple connected for access device it is outer
Portion port, each outside port are connect with the CPU of front end management host, and the server can pass through center switch pair
Every front end management host issues white list and device type identification feature library, and this method is as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message,
The CPU of front end management host starts Port Mirroring poll, successively will report according to the sequence of front end management host outside port
Text is mirrored to CPU management mouths, and the CPU of front end management host analyzes mirror image message, obtains the information of each access device,
Including access device IP address, MAC Address, protocol type, port numbers, message length and condition code.
S2, access device identification:The CPU of front end management host identifies according to the condition code of access device in device type special
Sign is matched in library, if matched arrive, returning equipment type number, and go to S3;Enter less than if if matching white
List matching treatment returns to invalid device type and numbers if it fails to match for white list, and front end management host
CPU executes action according to user configuration, goes to S5;If white list successful match, goes to S6.
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return and is identified in device type
It is matched in feature database, verifies the authorization message of the device type, then tentatively confirm that the access device is if the verification passes
Legal authorization equipment, and go to S4;If verification does not pass through, it is special that the information of the access device is added to device type identification
It levies in library, and goes to S5.
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching
Device type identification feature library, if return device type number and device type identification feature library in identify it is inconsistent,
And there is no compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and
Go to S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6.
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When
When thering is access device to access front end management host, then S1 is back to.
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow
When abnormal, report and alarm.
Wherein, the white list content includes:MAC Address, IP address, protocol type and port numbers, user can also
The white list on same front end management host is allocated by server, white name is separately provided for each outside port
It is single;The device type identification feature library includes:Device type number, device type title, device type protocol characteristic, end
The authorization message of slogan, message length and device type number, the device type protocol characteristic includes protocol number, each
Device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
In embodiments of the present invention, in the S2 and S4, if user configuration is alarm, front end management host
CPU sends a warning message;If user configuration is to block and alert, the CPU of front end management host directly blocks the access
Equipment communicates, and sends a warning message, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment
It is counterfeit ".Wherein, user configuration determines that execute access device Communication Block is controlled by two-layer retransmitting table.
In embodiments of the present invention, S2 access devices identify, are to determine that the access is set by the identification of device type feature
Standby is what kind of equipment, for example is the equipment of which production, what kind of equipment;The legal identification of S3 equipment is into one
It walks and authority checking is carried out to the type of the equipment, determine whether the access device is legitimate device by mandate, but more than
Two steps can not detect whether the access device is counterfeit equipment, and the personation identification of S4 equipment can be according to the IP of access device
Address and MAC Address (embedding a unique MAC Address when each network equipment (such as network interface card, hub, router) production)
Matched with device type identification feature library whether consistent and compatibility relation, whether the equipment of automatic detection access is counterfeit
Equipment.For example, when match it is inconsistent when, there are it is following the fact that, i.e., the network interface card in the access device carried out replacement,
Then the MAC Address of the access device is exactly the MAC Address of the network interface card, if the network interface card be by certification can with the access device into
Row is matched, means that the access device and the MAC Address are compatible, it can be assumed that being non-counterfeit devices;Otherwise incompatible, it can
It is exactly counterfeit devices to regard as the access device.
Identification by device type feature and the mandate to device type, we can be with the equipment that automatic identification accesses
No is the legitimate device for passing through mandate, whether the equipment that can also detect access automatically is counterfeit equipment.But either white name
All there is certain defect and deficiency in monotype or equipment feature recognition pattern.The manual typing of white list imports all by hand
It needs to artificially collect access device information, although finding that the addition of one key of window phase substantially increases the efficiency artificially collected automatically,
But window phase how long is properHow wherein mixed illegality equipment rejectsWhat window phase was subsequently added or replaced
How equipment is addedIt would therefore be desirable to be realized by device type feature recognition and according to device type mandate automatic, fast
Prompt, easily admission control.But device type feature recognition or inadequate is only leaned on, because of the receipts of device type feature
Collection, update, the period of feature message and third party sdk opening status etc. all more or less affect part access and set
Standby feature recognition.Therefore, by the way that white list mechanism and device type feature recognition are combined common realization access device
Illegal access detection, the counterfeit detection of equipment, unauthorized access detection, automatic quickly device type identification and authorize, set temporarily
The functions such as the mandate of standby access, the mandate of emergency set.
Further, the front end management host and general switch are communicated by a smooth cat with center switch respectively
Connection, and can be communicated to connect between different front end management hosts, between front end management host and general switch.
In embodiments of the present invention, camera is connect as access device with the outside port on front end management host,
In, the outside port being connect with camera uses RJ45 interfaces, the outside port being connect with light cat to use RJ45-UP interfaces, tool
Body utilization is as follows, refering to fig. 1:
1) unauthorized access access device, is accessed from the RJ45 mouths of front end management host, at this point, front end management host analysis
Mirror image this paper of the port, if it find that the access device puts to the proof information not in device type identification feature library, then further
Match white list;If it fails to match for white list, (two-layer retransmitting table control) is communicated according to the direct blocking equipment of user configuration
And " illegal access " warning information is sent, or only send " illegal access " warning information.
2), if it find that according to IP address of equipment and MAC Address from front end management host local or the equipment class of server
What the device type that is obtained in type identification feature library and being put to the proof according to equipment obtained in information from device type identification feature database sets
Standby Type-Inconsistencies then directly block the access device to communicate and send " equipment is counterfeit " warning information or only according to user configuration
Send " equipment is counterfeit " warning information.If it is the known device type equipment being newly added, then before the facility information being added to
It holds in managing main frame local or the asset identification library of server.
3) access device of unauthorized access, is accessed from the RJ45 mouths of general switch, the access device of the unauthorized access
The data for the other-end for being front end management host can be accessed not, but if being accessed by front end management host RJ45-UP
The data of the front end management host, the mirror image of the front end management host analysis port is herein.If it find that the access device is lifted
Information is demonstrate,proved not in device type identification feature library, then further matches white list, if also it fails to match for white list, basis
User configuration executes devices block and alerts and still only alerts;If in device type number and device type identification feature library
It is inconsistent, then according to user configuration execute devices block and alert or only alert.
4) access device of unauthorized access, is accessed from the RJ45 mouths of center switch, which can be accessed
It is not the data of the other-end of front end management host, but if accessing the front end management by front end management host RJ45-UP
The data of host, the mirror image of the front end management host analysis port herein, do not exist if it find that the access device puts to the proof information
In device type identification feature library, then further matching white list is held if also it fails to match for white list according to user configuration
Row devices block and alert still only alert;If inconsistent in device type number and device type identification feature library,
Devices block is then executed according to user configuration and alerts or only alerts.
In embodiments of the present invention, the general switch can be substituted for front end management host, be exchanged with center
Machine communicates to connect.When all deploying front end management host, then it can ensure access safety in total system, realize video monitoring comprehensively
The safety of network.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
Any modification, equivalent replacement or improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (6)
1. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list, it is characterised in that:This method base
In the front end management host being connect with access device, the front end management host is equally handed over by center with general switch
It changes planes and is connect with server, be provided in the front end management host and detect and control work(with illegal access and unauthorized access
Can CPU, be provided with multiple outside ports connected for access device on the front end management host, each outside port is equal
It is connect with the CPU of front end management host, the server can issue every front end management host by center switch
White list and device type identification feature library, this method are as follows:
S1, data message analysis:Access device accesses the outside port of front end management host, and outside port receives message, front end
The CPU of managing main frame starts Port Mirroring poll, according to the sequence of front end management host outside port, successively by message mirror
As managing mouth to CPU, the CPU of front end management host analyzes mirror image message, obtains the information of each access device, including
Access device IP address, MAC Address, protocol type, port numbers, message length and condition code;
S2, access device identification:The CPU of front end management host is according to the condition code of access device in device type identification feature library
In matched, if matched arrive, returning equipment type number, and go to S3;Enter white list less than if if matching
Matching treatment returns to invalid device type number, and the CPU roots of front end management host if it fails to match for white list
Action is executed according to user configuration, goes to S5;If white list successful match, goes to S6;
The legal identification of S3, equipment:The CPU of front end management host is numbered according to the device type of return in device type identification feature
It is matched in library, verifies the authorization message of the device type, then tentatively confirm that the access device is legal if the verification passes
Authorisation device, and go to S4;If verification does not pass through, the information of the access device is added to device type identification feature library
In, and go to S5;
S4, equipment personation identification:The CPU of front end management host is according to the IP address and MAC Address of the access device, matching unit
Type identification feature database and does not have if the device type number returned and identifying inconsistent in device type identification feature library
There is compatibility relation, then explanation is the equipment of personation, and the CPU of front end management host executes action according to user configuration, and goes to
S5;If consistent, the CPU of front end management host allows the access device to communicate, and goes to S6;
The message of S5, the next access device of analysis, go to S2;If message not to be analyzed terminates to analyze;When connecing
When entering equipment access front end management host, then S1 is back to;
S6, front end management host CPU to allow communication access device carry out flow analysis, once find flow be abnormal
When, report and alarm.
2. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1,
It is characterized in that:The white list content includes:MAC Address, IP address, protocol type and port numbers, user can also pass through
Server is allocated the white list on same front end management host, and white list is separately provided for each outside port.
3. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1,
It is characterized in that:The device type identification feature library includes:Device type number, device type title, device type agreement
The authorization message of feature, port numbers, message length and device type number, the device type protocol characteristic includes agreement
Number, each device type protocol characteristic includes one or more features code, condition code mask, condition code offset information.
4. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1,
It is characterized in that:In the S2 and S4, if user configuration is alarm, the CPU of front end management host sends a warning message;
If user configuration is to block and alert, the CPU of front end management host directly blocks the access device to communicate, and sends announcement
Alert information, wherein the warning information in S2 is " illegal access ", and the warning information in S4 is " equipment is counterfeit ".
5. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1,
It is characterized in that:The front end management host and general switch are communicated to connect by a smooth cat and center switch respectively, and
It can be communicated to connect between different front end management hosts, between front end management host and general switch.
6. a kind of video monitoring safety cut-in method based on equipment feature recognition and white list as described in claim 1 or 5,
It is characterized in that:The general switch can be substituted for front end management host, be communicated to connect with center switch.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810157447.8A CN108521399A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition and white list |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810157447.8A CN108521399A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition and white list |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108521399A true CN108521399A (en) | 2018-09-11 |
Family
ID=63433291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810157447.8A Pending CN108521399A (en) | 2018-02-24 | 2018-02-24 | A kind of video monitoring safety cut-in method based on equipment feature recognition and white list |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108521399A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110311809A (en) * | 2019-06-12 | 2019-10-08 | 杭州迪普科技股份有限公司 | The access terminal monitoring and managing method and device of video monitoring system |
CN111031067A (en) * | 2019-12-24 | 2020-04-17 | 上海中信信息发展股份有限公司 | Monitoring data transmission method and device of distributed system and electronic equipment |
CN111327577A (en) * | 2018-12-17 | 2020-06-23 | 浙江宇视科技有限公司 | Switch-based security access method and device |
CN111372075A (en) * | 2020-02-28 | 2020-07-03 | 钱秀华 | Network image diagnosis method and device and image processing equipment |
CN111491129A (en) * | 2019-01-29 | 2020-08-04 | 深圳市共进电子股份有限公司 | Network monitoring system, router operation method and device and router |
CN111970141A (en) * | 2020-06-30 | 2020-11-20 | 浙江远望信息股份有限公司 | Office network hardware asset partitioning method based on similarity of IP address and MAC address |
WO2022033381A1 (en) * | 2020-08-11 | 2022-02-17 | 杭州海康威视数字技术股份有限公司 | Connection control method, system and apparatus, and electronic device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118271A (en) * | 2011-03-29 | 2011-07-06 | 上海北塔软件股份有限公司 | Method for discovering illegally-accessed equipment |
CN102333094A (en) * | 2011-10-12 | 2012-01-25 | 杭州华三通信技术有限公司 | Safety control method and equipment |
CN105024999A (en) * | 2015-06-02 | 2015-11-04 | 江苏恒信和安电子科技有限公司 | IP video monitoring network security access method |
CN106341656A (en) * | 2016-08-31 | 2017-01-18 | 浙江远望信息股份有限公司 | Video equipment monitoring method, device and system |
US20170063882A1 (en) * | 2015-08-26 | 2017-03-02 | Microsoft Technology Licensing, Llc. | Monitoring the life cycle of a computer network connection |
CN106789935A (en) * | 2016-11-29 | 2017-05-31 | 上海辰锐信息科技公司 | A kind of terminal abnormal detection method |
CN107302527A (en) * | 2017-06-09 | 2017-10-27 | 北京奇安信科技有限公司 | A kind of unit exception detection method and device |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
-
2018
- 2018-02-24 CN CN201810157447.8A patent/CN108521399A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118271A (en) * | 2011-03-29 | 2011-07-06 | 上海北塔软件股份有限公司 | Method for discovering illegally-accessed equipment |
CN102333094A (en) * | 2011-10-12 | 2012-01-25 | 杭州华三通信技术有限公司 | Safety control method and equipment |
CN105024999A (en) * | 2015-06-02 | 2015-11-04 | 江苏恒信和安电子科技有限公司 | IP video monitoring network security access method |
US20170063882A1 (en) * | 2015-08-26 | 2017-03-02 | Microsoft Technology Licensing, Llc. | Monitoring the life cycle of a computer network connection |
CN106341656A (en) * | 2016-08-31 | 2017-01-18 | 浙江远望信息股份有限公司 | Video equipment monitoring method, device and system |
CN106789935A (en) * | 2016-11-29 | 2017-05-31 | 上海辰锐信息科技公司 | A kind of terminal abnormal detection method |
CN107302527A (en) * | 2017-06-09 | 2017-10-27 | 北京奇安信科技有限公司 | A kind of unit exception detection method and device |
CN107395588A (en) * | 2017-07-18 | 2017-11-24 | 浙江远望通信技术有限公司 | Video monitoring accesses safe blocking-up method and system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327577A (en) * | 2018-12-17 | 2020-06-23 | 浙江宇视科技有限公司 | Switch-based security access method and device |
CN111327577B (en) * | 2018-12-17 | 2022-10-04 | 浙江宇视科技有限公司 | Switch-based security access method and device |
CN111491129A (en) * | 2019-01-29 | 2020-08-04 | 深圳市共进电子股份有限公司 | Network monitoring system, router operation method and device and router |
CN110311809A (en) * | 2019-06-12 | 2019-10-08 | 杭州迪普科技股份有限公司 | The access terminal monitoring and managing method and device of video monitoring system |
CN111031067A (en) * | 2019-12-24 | 2020-04-17 | 上海中信信息发展股份有限公司 | Monitoring data transmission method and device of distributed system and electronic equipment |
CN111372075A (en) * | 2020-02-28 | 2020-07-03 | 钱秀华 | Network image diagnosis method and device and image processing equipment |
CN111372075B (en) * | 2020-02-28 | 2021-03-05 | 上海营湾医疗科技有限公司 | Network image diagnosis method and device and image processing equipment |
CN111970141A (en) * | 2020-06-30 | 2020-11-20 | 浙江远望信息股份有限公司 | Office network hardware asset partitioning method based on similarity of IP address and MAC address |
WO2022033381A1 (en) * | 2020-08-11 | 2022-02-17 | 杭州海康威视数字技术股份有限公司 | Connection control method, system and apparatus, and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108521399A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition and white list | |
CN109729180B (en) | Whole system intelligent community platform | |
CN108494737A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition | |
CN100384150C (en) | Method and system for preventing asynchronous ARP cache poisoning of multiple hosts | |
US8200798B2 (en) | Address security in a routed access network | |
CN108521398A (en) | A kind of video monitoring safety cut-in method based on equipment feature recognition, white list and constraint set flow control | |
US20130214901A1 (en) | System, station and method for mustering | |
CN106465416A (en) | Sensor network gateway | |
JP3618245B2 (en) | Network monitoring system | |
US8184545B2 (en) | Technique for combating loops in communication network | |
CN107395588A (en) | Video monitoring accesses safe blocking-up method and system | |
JP2003069573A (en) | System and method for managing network equipment using information recording medium | |
JP2002185539A (en) | Ip communication network system having unauthorized intrusion protection function | |
CN108156043A (en) | A kind of video monitoring safety cut-in method based on white list and constraint set flow control | |
CN101529862A (en) | Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis | |
CN107276983A (en) | A kind of the traffic security control method and system synchronous with cloud based on DPI | |
CN108629201A (en) | A method of database illegal operation is blocked | |
CN112491888A (en) | Method and system for preventing equipment from being falsely used | |
CN109150853A (en) | The intruding detection system and method for role-base access control | |
CN103618613A (en) | Network access control system | |
CN111970233A (en) | Analysis and identification method for network violation external connection scene | |
CN101399814B (en) | Method, system and device for verifying relation between data link layer address and sending side | |
CN112367315B (en) | Endogenous safe WAF honeypot deployment method | |
CN101888296A (en) | Method, device, equipment and system for detecting shadow user | |
CN103139056A (en) | Secure gateway and network data interactive method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 311800 Jiyang city street, Jiyang, Zhuji, Shaoxing, Zhejiang (Jiyang Industrial Park) Applicant after: Zhejiang Yuanwang Telecom Technology Co., Ltd Address before: 311800 Shaoxing, Zhuji, Zhejiang Jiyang Road 98 North Ring Road No. Applicant before: Zhejiang Yuanwang Telecom Technology Co., Ltd |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180911 |
|
RJ01 | Rejection of invention patent application after publication |